Browse Definitions :
Definition

Twitter Lite

Twitter Lite is a storage and bandwidth-efficient version of the app for Twitter. The app enables those with phone plans with expensive data, slow networks, as in some emerging markets, to reduce the data usage associated with the social media network, Twitter. The lightweight client is also useful for those with slower devices, connections or for those who just want to save resources for other apps.

The lite version of the app allows for all the expected functions on Twitter, reading and posting tweets, exchanging direct messages, creating twitter lists, managing your profile and you can still tweet pictures and video. The bandwidth conservation is brought through by way of optimizations, especially for 3G and 2G networks. The app is 70% smaller than the full size version in its space requirements. 

The new efficient client weighs in at a minute .5MB as opposed to the full size app at 33MB and greater. The Twitter Lite client loads a minimum of images in general to limit data usage in general. Automatic playing videos are avoided. The app offers a data saver feature that loads a blurry low resolution preview of images to avoid wasted bandwidth on content the user doesn't need.

This was last updated in December 2018

Continue Reading About Twitter Lite

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

Close